Search results
1 – 10 of 169Eva PenzeyMoog and Danielle C. Slakoff
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this…
Abstract
The reality of domestic violence does not disappear when people enter the digital world, as abusers may use technology to stalk, exploit, and control their victims. In this chapter, we discuss three unique types of technological abuse: (1) financial abuse via banking websites and apps; (2) abuse via smart home devices (i.e., “Internet of Things” abuse); and (3) stalking via geo-location or GPS. We also argue pregnancy and wellness apps provide an opportunity for meaningful intervention for pregnant victims of domestic violence.
While there is no way to ensure users' safety in all situations, we argue thoughtful considerations while designing and building digital products can result in meaningful contributions to victims' safety. This chapter concludes with PenzeyMoog's (2020) “Framework for Inclusive Safety,” which is a roadmap for building technology that increases the safety of domestic violence survivors. This framework includes three key points: (1) the importance of educating technologists about domestic violence; (2) the importance of identifying possible abuse situations and designing against them; and (3) identifying user interactions that might signal abuse and offering safe interventions.
Details
Keywords
Eloise Atkinson, John Spillane, Jim Bradley and Tara Brooks
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction…
Abstract
Purpose
The purpose of this paper is to investigate the challenges faced with mobile information communication technology (M-ICT), more specifically tablet software, in the construction phase of UK infrastructure projects. Quality assurance in the context of passive fire protection is scrutinised, where M-ICT use is prevalent, to provide an industry perspective.
Design/methodology/approach
The research design is founded on exploratory multiple case study approach. Specific themes are developed, based on a critical review of previous ICT studies. The themes identified are used to inform a qualitative interview protocol for investigating three large UK infrastructure projects. Each project is at different stages in the construction phase, with varying examples of M-ICT implementation in use. Participants are interviewed regarding their experiences of the implementation of M-ICT on each project.
Findings
Findings identify diverse experiences across each project. Single and multiple M-ICT platforms are currently being used, with individual stakeholders using ICT in isolation, and in some instances, multiple project stakeholders are using it together. Complete replacement of paper-based processes is evident in one case study, but more commonly, digital technology is being used in parallel to traditional paper-based processes. The challenges, although varied across each case study, can be categorised under the themes of Technology (IT support, ICT infrastructure, IT security, contractual, software), People (social aspects, user competency, safety), Technical Compliance (technical compliance evidence) and Process (conventional processes).
Originality/value
It is recommended that each theme be reviewed at project commencement, with all key stakeholders, to ensure key aspects are considered prior to M-ICT deployment. This will ensure avoidance of challenges reported and maximise the opportunities that are available through M-ICT in a multi-stakeholder infrastructure project.
Details
Keywords
George Okechukwu Onatu, Wellington Didibhuku Thwala and Clinton Ohis Aigbavboa
Adam Biggs, Greg Huffman, Joseph Hamilton, Ken Javes, Jacob Brookfield, Anthony Viggiani, John Costa and Rachel R. Markwald
Marksmanship data is a staple of military and law enforcement evaluations. This ubiquitous nature creates a critical need to use all relevant information and to convey outcomes in…
Abstract
Purpose
Marksmanship data is a staple of military and law enforcement evaluations. This ubiquitous nature creates a critical need to use all relevant information and to convey outcomes in a meaningful way for the end users. The purpose of this study is to demonstrate how simple simulation techniques can improve interpretations of marksmanship data.
Design/methodology/approach
This study uses three simulations to demonstrate the advantages of small arms combat modeling, including (1) the benefits of incorporating a Markov Chain into Monte Carlo shooting simulations; (2) how small arms combat modeling is superior to point-based evaluations; and (3) why continuous-time chains better capture performance than discrete-time chains.
Findings
The proposed method reduces ambiguity in low-accuracy scenarios while also incorporating a more holistic view of performance as outcomes simultaneously incorporate speed and accuracy rather than holding one constant.
Practical implications
This process determines the probability of winning an engagement against a given opponent while circumventing arbitrary discussions of speed and accuracy trade-offs. Someone wins 70% of combat engagements against a given opponent rather than scoring 15 more points. Moreover, risk exposure is quantified by determining the likely casualties suffered to achieve victory. This combination makes the practical consequences of human performance differences tangible to the end users. Taken together, this approach advances the operations research analyses of squad-level combat engagements.
Originality/value
For more than a century, marksmanship evaluations have used point-based systems to classify shooters. However, these scoring methods were developed for competitive integrity rather than lethality as points do not adequately capture combat capabilities. The proposed method thus represents a major shift in the marksmanship scoring paradigm.
Details